IoT on AWS 2019

Ken Rimple discusses the key concepts and terminology of the Internet of Things, including Types of IoT devices, networking hardware, transport and protocols, and how they relate to our event and the real world. Topics discussed include connectivity examples and various IoT devices. By Ken Rimple, Director of Training/Mentoring Services, Chariot Solutions

There are many ways to add wireless connectivity to a device. We’ll take a brief tour of the some of these like WiFi, Bluetooth, ZigBee, Zwave, NFC, Cellular, LoRa, and Sigfox. We’ll talk about some of the pros and cons of each technology to help you decide which is best for your use case. By … Read More

What is MQTT? How does it work? Why should you care? We’ll discuss the MQTT protocol and how AWS IoT Core is an MQTT Broker able to send and receive messages to and from devices. By Don Coleman, CIO of Chariot Solutions

AWS IoT provides connectivity to IoT devices through HTTP and MQTT. In this session we learn how to leverage AWS Core IoT as an MQTT broker, how to connect your devices using a client certificate, how policies can enforce data security, and how rules are used to move data elsewhere in the AWS infrastructure. By … Read More

Data has different purposes over time: when fresh, it can be used for real-time decision-making; as it ages, it becomes useful for analytics; eventually, it becomes a record, useful or perhaps not. Each of these stages requires a different approach to storage and management, and this talk looks at appropriate ways to work with your … Read More

This talk will review two common use cases for the use of captured metric data: 1) Real-time analysis, visualization, and quality assurance, and 2) Ad-hoc analysis. Once metric data is generated, to support the use cases mentioned above it must be ingested properly using a robust and fault-tolerant streaming framework. The most common open source … Read More

In this session we will walk through the steps required to securely communicate with your device using the Device Shadow service. This will include an overview of user authentication and authorization, connecting to AWS IoT, and using MQTT to communicate with the device’s “Device Shadow” to read and update its state. All this, using the … Read More

Our guest speaker at the event this week was Steven Pressman of Alpine Cyber Solutions. Here is his abstract, covering how to secure AWS-based applications. “Storing your data in AWS can be the best decision you ever make, or the worst nightmare you can fathom. It all depends on the decisions you make at the … Read More

Amazon uses a “pay as you go” pricing model: you pay for the resources that you use, and in most cases don’t need to pre-allocate resources. While this allows your business to scale, it means that each component of your data pipeline will incur a separate charge, which can obscure the overall cost of running … Read More